(154 actual and answer) Western Governors University
Correct
Incorrect
Your answers
Agility
, Don't know?
2 of 154
Term
Which type of virus intends to make itself difficult to detect or
analyze?
Give this one a try later!
Trojan horse Logic bomb
Armored virus Rootkit
Don't know?
3 of 154
Term
Which service or role is an example of a use case for containers?
Give this one a try later!
Monoliths Microservices
Leased Lines Web Services
, Don't know?
4 of 154
Term
Which connection-oriented protocol can be used to set up a secure
session for remote logins?
Give this one a try later!
Remote desktop protocol (rdp) Secure shell (SSH)
Network time protocol (ntp) File transfer protocol (FTP)
Don't know?
5 of 154
Term
What is the main protocol at the internet layer of the TCP/IP layer
and also considered the workhorse of the TCP/IP?
Give this one a try later!
DRAM High-end CPU
, IP Volatility
Don't know?
6 of 154
Term
Which database is the best option for storing data in RAM when
creating a back-end stack?
Give this one a try later!
Cassandra Redis
LAN Apache
Don't know?
7 of 154
Term
Which type of non-functional requirement (NFR) ensures that an
updated database can return back in the event of update failures?
Give this one a try later!
Security Reliability